Sciweavers

1986 search results - page 301 / 398
» constraints 2006
Sort
View
DSN
2006
IEEE
14 years 2 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
ECRTS
2006
IEEE
14 years 2 months ago
Real-Time Scheduling with Regenerative Energy
This paper investigates real-time scheduling in a system whose energy reservoir is replenished by an environmental power source. The execution of tasks is deemed primarily energy-...
Clemens Moser, Lothar Thiele, Luca Benini, Davide ...
FDL
2006
IEEE
14 years 2 months ago
Functional Virtual Prototyping Design Flow and VHDL-AMS
Needs in the worldwide competition push teams to master more and more their design flow in order to minimize risks, costs, time to market, and potential liabilities. The classical...
Yannick Hervé, Patricia Desgreys
GLOBECOM
2006
IEEE
14 years 2 months ago
Further Analysis of XCP Equilibrium Performance
— Low analyzes the equilibrium performance of the recently developed eXplicit Control Protocol (XCP) by applying the derived window-based dynamical model. However, Low’s window...
Peng Wang, David L. Mills
GLOBECOM
2006
IEEE
14 years 2 months ago
AR-PIN/PDC: Flexible Advance Reservation of Intradomain and Interdomain Lightpaths
— A collection of Grid computing resources interconnected by an application-configurable network of lightpaths is called a LambdaGrid. It provides data-intensive applications wit...
Eric He, Xi Wang, Venkatram Vishwanath, Jason Leig...